Registry Items
This page provides more detail about what is collected in a Windows 'Registry Items' acquisition profile.
What It Collects
The Registry Items evidence type collects persistence-related artefacts from the Windows Registry. This is a targeted acquisition, not a full registry dump. It focuses only on registry keys and values that are commonly used by malware — and occasionally by legitimate software — to maintain persistence on a system.
Specific Keys Collected
The collector examines over a thousand registry locations. These fall into six main categories:
1. Startup and Run Keys
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
HKU\S-1-5-*\Software\Microsoft\Windows\CurrentVersion\Run
HKU\S-1-5-*\Software\Microsoft\Windows\CurrentVersion\RunOnce
Terminal Server startup locations
Policy-based Run keys
2. Winlogon Persistence
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
(values such as Shell, Userinit, Taskman)HKU\S-1-5-*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
3. Shell Extensions and Context Menus
Context menu handlers for files, folders, and drives
Property sheet handlers
Drag-and-drop handlers
Shell icon overlay identifiers
Browser Helper Objects (BHOs)
4. System-Level Persistence
SYSTEM\CurrentControlSet\Control\Session Manager
(values such as BootExecute and Execute)LSA authentication and notification packages
Security providers
Print monitors
Image File Execution Options (IFEO) – debugger hijacking
5. Browser and Application Extensions
Internet Explorer toolbars and extensions
Mozilla plugins
Active Setup components
6. Services and Drivers
Service-related registry locations
Driver loading mechanisms
Why This Evidence Is Valuable
Malware detection – Most persistent malware leverages these registry locations.
Incident response – Rapid identification of unauthorized or suspicious startup programs.
Forensic analysis – Reconstruct what executables and components were configured to launch automatically.
Compliance and validation – Verify that only approved software is using persistence mechanisms.
Last updated
Was this helpful?